EconBiz - Find Economic Literature
    • Logout
    • Change account settings
  • A-Z
  • Beta
  • About EconBiz
  • News
  • Thesaurus (STW)
  • Academic Skills
  • Help
  •  My account 
    • Logout
    • Change account settings
  • Login
EconBiz - Find Economic Literature
Publications Events
Search options
Advanced Search history
My EconBiz
Favorites Loans Reservations Fines
    You are here:
  • Home
  • Search: subject:"User Authentication"
Narrow search

Narrow search

Year of publication
Subject
All
User authentication 4 Consumer behaviour 2 Data security 2 Datensicherheit 2 E-commerce 2 Electronic Commerce 2 Konsumentenverhalten 2 user authentication 2 Access control 1 Android unlock patterns 1 Autobiographical memory 1 Biometrics 1 Biometrie 1 Cross-Platform and Cross-Browser Compatibility 1 Data protection 1 Datenschutz 1 Device Independence 1 Differentiated authentication 1 Digital Certificate 1 E-Government 1 E-Learning 1 E-government 1 E-learning 1 Education 1 Graphical password 1 IT competencies 1 IT knowledge 1 Internet 1 Mobile phone 1 Mobile security 1 Mobiltelefon 1 Online banking 1 Passwords 1 Risk profiling 1 Safety engineering 1 Security 1 Sicherheitstechnik 1 Social Web 1 Social web 1 South Korea 1
more ... less ...
Online availability
All
Undetermined 4 Free 2
Type of publication
All
Article 6 Book / Working Paper 1
Type of publication (narrower categories)
All
research-article 3 Arbeitspapier 1 Article in journal 1 Aufsatz in Zeitschrift 1 Graue Literatur 1 Non-commercial literature 1 Working Paper 1 review-article 1
more ... less ...
Language
All
English 6 Undetermined 1
Author
All
Ahmad, Ayat Al 1 Al-Ameen, Mahdi Nasrullah 1 Awad, Sari 1 Butler, Martin 1 Butler, Rika 1 Farouq, Fairouz 1 Haque, S.M. Taiabul 1 Keszthelyi, András 1 Meng, Weizhi 1 Michelberger, Pál 1 Obeidallah, Randa 1 Park, Hun Myoung 1 Steenkamp, L.P. 1 Wessels, P.L. 1 Wright, Matthew 1
more ... less ...
Institution
All
Keleti Károly Gazdasági Kar, Óbudai Egyetem 1
Published in...
All
Information & Computer Security 3 Economics & management series 1 International journal of business information systems : IJBIS 1 Meditari Accountancy Research 1 Proceedings of FIKUSZ '11 1
Source
All
Other ZBW resources 4 ECONIS (ZBW) 2 RePEc 1
Showing 1 - 7 of 7
Cover Image
The pitfalls of the certificate-based user authentication scheme on Korean public websites : implications for cross-platform and cross-browser compatibility and end-user computing
Park, Hun Myoung - 2023
Persistent link: https://www.econbiz.de/10014329184
Saved in:
Cover Image
Leveraging autobiographical memory for two-factor online authentication
Al-Ameen, Mahdi Nasrullah; Haque, S.M. Taiabul; Wright, … - In: Information & Computer Security 24 (2016) 4, pp. 386-399
Purpose Two-factor authentication is being implemented more broadly to improve security against phishing, shoulder surfing, keyloggers and password guessing attacks. Although passwords serve as the first authentication factor, a common approach to implementing the second factor is sending a...
Persistent link: https://www.econbiz.de/10014754620
Saved in:
Cover Image
Evaluating the effect of multi-touch behaviours on Android unlock patterns
Meng, Weizhi - In: Information & Computer Security 24 (2016) 3, pp. 277-287
Purpose This paper aims to evaluate the effect of multi-touch behaviours on creating Android unlock patterns (AUPs) by realising that users can perform more actions in touch-enabled mobile phones. Design/methodology/approach The author conducted two user studies with a total of 45 participates...
Persistent link: https://www.econbiz.de/10014754905
Saved in:
Cover Image
Investigating the possibility to use differentiated authentication based on risk profiling to secure online banking
Butler, Martin; Butler, Rika - In: Information & Computer Security 23 (2015) 4, pp. 421-434
transacting on the Internet. User authentication, a human-centric process, is regarded as the basis of computer security and hence …
Persistent link: https://www.econbiz.de/10014754867
Saved in:
Cover Image
Students authentication in e-assessment sessions : a theoretical biometric model for smartphone devices
Obeidallah, Randa; Ahmad, Ayat Al; Farouq, Fairouz; … - In: International journal of business information systems : … 19 (2015) 4, pp. 450-464
Persistent link: https://www.econbiz.de/10011405906
Saved in:
Cover Image
The ability of students to convert their knowledge of IT concepts into IT competencies
Wessels, P.L.; Steenkamp, L.P. - In: Meditari Accountancy Research 15 (2007) 2, pp. 113-129
The current syllabus (programme of education) prescribed by the South African Institute of Chartered Accountants (SAICA) emphasises that it is important for students to acquire knowledge and skills in interacting with information technology (IT). One of the basic IT skills identified by SAICA is...
Persistent link: https://www.econbiz.de/10014930455
Saved in:
Cover Image
Password strength and memorability
Keszthelyi, András - Keleti Károly Gazdasági Kar, Óbudai Egyetem
Users can be authenticated by three different ways: on the basis of what they know (password/pin), or what they have (smartcard etc.), or what they are (biometrics). The price and complexness of these methods increases in this order. One would think that the more complex or more expensive a...
Persistent link: https://www.econbiz.de/10010627635
Saved in:
A service of the
zbw
  • Sitemap
  • Plain language
  • Accessibility
  • Contact us
  • Imprint
  • Privacy

Loading...